Feeds

Is Dropbox good enough to be called 'good enough'?

Our man wanders lonely as a personal Cloud

Combat fraud and increase customer satisfaction

Blocks and Files Dropbox is popular for syncing and sharing files across smartphones, tablets, notebooks and desktop PCs. I use it myself in my all-Apple computing universe of iMac, MacBook Air, iPad and iPhone, and I use it in preference to Apple's iCloud.

The killer aspect for me? Dropbox is a device icon that acts like a folder of files. God knows what iCloud is; it screws up calendar sync and iTunes music and film sync and that kills it stone dead for me. And I don't care if I'm doing something wrong; the damn thing should just sort it out. With Dropbox there is no wrong to do; file drag 'n drop being pretty basic.

Dropbox doesn't do calendars or iTunes music/film sync but I don't care about that. Nice features but not mandatory. What about security?

Dropbox says:

It uses modern encryption methods to both transfer and store your data.
- Secure Sockets Layer (SSL) and AES-256 bit encryption
- Dropbox website and client software have been hardened against attacks from hackers
- Public files are only viewable by people who have a link to the file(s). Public folders are not browsable or searchable
- Dropbox uses Amazon's Simple Storage Service (S3) for storage, which has a robust security policy of its own.

That's good enough, surely? And these days we're supposed not to let aspirations towards "good" get in the way of achieving "good enough".

Longer term I reckon file sync 'n share will become an operating system feature and stop being a separate product category, much as deduplication became a universal feature. But the OSes will have to become much slicker and more reliable at file sharing.

Am I right or am I wrong?

Post comments to the BYOD sync 'n share storage forum topic, do. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.